Cyber Security Monitoring

Security Operation Centre (SOC) and
SIEM-as-a-Service

Our Expert Team

Fully managed cybersecurity risk management with 24/7 threat interception

Real time security monitoring from our ISO 27001 security operations centre

Powered by AlienVault Unified Security Management (USM) SIEM Platform

How it Works

Your Cybersecurity Monitoring Service

Asset
Discovery
Vulnerability assessment
Intrusion Detection
Threat Interception
Breach Investigation
Behavioural Monitoring
Incident Managinement
SIEM Log Management

Truly Unlimited Service

We don’t restrict Your SIEM service is not restricted to a number of incidents. It’s truly unlimited. You know you are fully protected and secure, regardless of whether you experience one security incident in a year or 10000s

Qualified, Certified Security Experts

Our skilled and experienced team possess CEH, CISSP, CISM, CISA etc. certifications. Our incident response team provide enterprise grade, fast, tailored made incident responses

Tailored, Personalised Service

No-one wants to bounce around a call centre speaking to strangers. We regularly engage with your technical team, ensuring that our SOC analysts deeply understand your IT environment.

Why Work With Us?

Our Process

10,000+  User
Projects
Responsible for 5000+ Servers

Cybersecurity Projects We Work On

Greenfield projects, transformation programmes, infrastructure projects, security during Merger & Acquisitions (M&A) technical roadmap alignment, technical refresh projects and end of life migrations (EOL)

Our Supported Technologies & Products

  • Network and computer security– Firewalls, IDS/IPS, Content Filtering, Antivirus, VPN, DoS/DDoS and Load Balancer
  • Data security –Encryption, Data Loss Prevention and Mobile Security
  • Application security – Web Application Firewall
  • Cloud Security – AWS, Azure and O365 Security
  • Email Security - Office365 EOP and ATP

Our Supported Technologies & Products

  • Network and computer security– Firewalls, IDS/IPS, Content Filtering, Antivirus, VPN, DoS/DDoS and Load Balancer
  • Data security –Encryption, Data Loss Prevention and Mobile Security
  • Application security – Web Application Firewall
  • Cloud Security – AWS, Azure and O365 Security
  • Email Security - Office365 EOP and ATP

Affordable Vulnerability Testing-

Preparation, Scanning,

Remedial Actions

& Rescan

  • We use vulnerability and compliance tool, Qualys Cloud Platform, rated industry leader by Gartner, Forrester and IDCWe identify security vulnerabilities with six Sigma (99.99966%) accuracy

  • External vulnerability testing from the internet perspective and internal security testing of your IT infrastructure 

  • You receive a jargon free report describing your security vulnerabilities

  • Your report includes specific technical details of root causes and remediation actions for your technical staff to implement

  • You can purchase this service on an ad-hoc or regular subscription basis 

  • Penetration testing of web applications, client-server applications, infrastructure, SCADA, ERP systems, mobile applications, wireless, and more

  • Full spectrum penetration testing capabilities – Information gathering, foot-printing, vulnerability assessment, exploitation, & reporting

  • Aligned with established standards and practices, combined with our extensive experience

Infrastructure Penetration Testing

  • Written consent is obtained before we identify vulnerabilities using Google searches, WHOIS, DNS queries, fingerprinting, password guessing, directory traversals, file uploads, denial of service attacks, buffer overflow exploits, etc.

Web Application Penetration Testing

  • We find remotely exploited vulnerabilities, application architecture, design and implementation. We assess user access controls, privilege levels & overall application  design. This gives the total threat profile of your web application environment.

  • You receive a jargon free report describing your security vulnerabilities with root causes and remediation actions for your technical staff to implement

Penetration Testing -

More than automated tools & technical reports

We secure your information & systems from real world attacks. 

Contact Us

Tel : +44 (0) 020 8242 4756
Email:  enquiry@icyberdefence.com

iCyberDefence Limited

20 Eastbourne Terrace,

Paddington,

London W2 6LG, UK

©2018 by iCyberDefence, a brand registered under  iCyberDefence Limited, registered in England and Wales, 10980510

Registered Office: 27 Old Gloucester Street, London, WC1N 3AX